General

  • Target

    04353425b24daa5a0ebf1144f7df8cc4922bfab5a67ee73239bbfc3427fca64d

  • Size

    99KB

  • Sample

    220212-nmmyssddhk

  • MD5

    a3f4c1a782784597fcc064d56b62282d

  • SHA1

    8f7c31798922309e5ab61bec2760e88d3608b3f8

  • SHA256

    04353425b24daa5a0ebf1144f7df8cc4922bfab5a67ee73239bbfc3427fca64d

  • SHA512

    9c4bd2893e4815f548449d0842813373162fe7af11ca3a1621a5c0a8cc1c6e2229c3174ebbf0a1fb64687c4eac680da6919af0432becf046d386c0cae6c975ba

Malware Config

Targets

    • Target

      04353425b24daa5a0ebf1144f7df8cc4922bfab5a67ee73239bbfc3427fca64d

    • Size

      99KB

    • MD5

      a3f4c1a782784597fcc064d56b62282d

    • SHA1

      8f7c31798922309e5ab61bec2760e88d3608b3f8

    • SHA256

      04353425b24daa5a0ebf1144f7df8cc4922bfab5a67ee73239bbfc3427fca64d

    • SHA512

      9c4bd2893e4815f548449d0842813373162fe7af11ca3a1621a5c0a8cc1c6e2229c3174ebbf0a1fb64687c4eac680da6919af0432becf046d386c0cae6c975ba

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks